Deep learning-based intrusion detection systems: a systematic review
Nowadays, the ever-increasing complication and severity of security attacks on computer
networks have inspired security researchers to incorporate different machine learning …
networks have inspired security researchers to incorporate different machine learning …
Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey
SM Ghaffarian, HR Shahriari - ACM computing surveys (CSUR), 2017 - dl.acm.org
Software security vulnerabilities are one of the critical issues in the realm of computer
security. Due to their potential high severity impacts, many different approaches have been …
security. Due to their potential high severity impacts, many different approaches have been …
Distributed denial of service attack prediction: Challenges, open issues and opportunities
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …
DDoS attacks have evolved in quantity and volume to evade detection and increase …
Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …
increase of network data and placed a high computation complexity across various …
A survey of intrusion detection systems in wireless sensor networks
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
Intrusion detection and big heterogeneous data: a survey
Intrusion Detection has been heavily studied in both industry and academia, but
cybersecurity analysts still desire much more alert accuracy and overall threat analysis in …
cybersecurity analysts still desire much more alert accuracy and overall threat analysis in …
Taxonomy and survey of collaborative intrusion detection
E Vasilomanolakis, S Karuppayah… - ACM computing …, 2015 - dl.acm.org
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …
A unified architectural approach for cyberattack-resilient industrial control systems
With the rapid development of functional requirements in the emerging Industry 4.0 era,
modern industrial control systems (ICSs) are no longer isolated islands, making them more …
modern industrial control systems (ICSs) are no longer isolated islands, making them more …
An intrusion detection and prevention system in cloud computing: A systematic review
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
Network attacks: Taxonomy, tools and systems
To prevent and defend networks from the occurrence of attacks, it is highly essential that we
have a broad knowledge of existing tools and systems available in the public domain. Based …
have a broad knowledge of existing tools and systems available in the public domain. Based …